Copyright 2005 John Wiley & Sons, Inc7 - 1 Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Chapter 5 Voice Communication Concepts and Technology.
Networks: Wireless LANs1 Wireless Local Area Networks.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
Business Data Communications and Networking 9th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Virginia F. Kleist, Ph.D. College of.
Network Technology CSE Network Technology CSE3020 Week 9.
CPET 260 – Network I Wireless Networks Bluetooth.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chapter 41 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
RELIABILITY OF WIRELESS NETWORKS Cagatay Bozturk.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
WLAN b a Johan Montelius
Networks Olga Agnew Bryant Likes Daewon Seo.
Chapter 8 Hardware Layers: Wireless Local Area Networks Networking
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 5 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications,
Chapter 5 outline 5.1 Introduction and services
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 6-1 Introduction to Information Technology.
Chapter 4 Local Area Networks. Layer 2: The Datalink Layer The datalink layer provides point-to- point connectivity between devices over the physical.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
CWNA Guide to Wireless LANs, Second Edition
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Copyright 2005 John Wiley & Sons, Inc7 - 1 Wireless Local Area Networks.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
PRESENTATION ON WI-FI TECHNOLOGY
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
A PRESENTATION ON “Wireless Networks”
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards Modified.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Slide 4-1 Chapter 4 Terms Data Communications and Networking Considerations Introduction to Information Systems Judith C. Simon.
S305 – Network Infrastructure Chapter 6 Local Area Network.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Chapter 15 Wireless LANs 15.# 1
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Topic : 4.0 WIRELESS TECHNOLOGIES.  Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
COMPUTER FUNDAMENTALS David Samuel Bhatti
Copyright 2010 John Wiley & Sons, Inc7 - 1 Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
S305 – Network Infrastructure Chapter 6 Local Area Network.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Copyright 2005 John Wiley & Sons, Inc
Wireless Technologies
Chapter 6 Local Area Network & Wireless LAN
WiFi Networks: IEEE b Wireless LANs
Chapter 6 Medium Access Control Protocols and Local Area Networks
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
Chapter 15 – Part 2 Networks The Internal Operating System
WiFi Networks: IEEE b Wireless LANs
Presentation transcript:

Copyright 2005 John Wiley & Sons, Inc7 - 1 Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Prof. M. Ulema Manhattan College Computer Information Systems

Copyright 2005 John Wiley & Sons, Inc7 - 2 Chapter 7 Wireless Local Area Networks

Copyright 2005 John Wiley & Sons, Inc7 - 3 Outline Introduction IEEE b IEEE a IEEE g Bluetooth Best practice WLAN Design Improving WLAN Performance

Copyright 2005 John Wiley & Sons, Inc7 - 4 Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables) Basic Categories –Use of Radio frequencies (FOCUS of this chapter) 802.1x family of standards (aka, Wi-Fi) –Use of Infrared frequencies (Optical transmission) Wi-Fi grown in popularity –Eliminates cabling –Facilitates network access from a variety of locations Airports, cafes, restaurants, etc., –Facilitates for mobile workers (as in a hospital)

Copyright 2005 John Wiley & Sons, Inc7 - 5 Principal WLANs Technologies IEEE b –Standardization started after.11a, but finished before IEEE a –First attempt to standardization of WLANs; more complicated than.11b IEEE g Bluetooth –Also an IEEE standard

Copyright 2005 John Wiley & Sons, Inc7 - 6 IEEE b Reuses many Ethernet components Designed to connect easily to Ethernet –a.ka., wireless Ethernet Also called Wi-Fi –Marketing ploy; sounds like Hi-Fi Versions of.11b –Direct Sequence Spread Spectrum (DSSS) Focus of this chapter (more popular) –Frequency Hopping Spread Spectrum (FHSS)

Copyright 2005 John Wiley & Sons, Inc7 - 7 Versions of IEEE b Direct Sequence Spread Spectrum (DSSS) –Uses the entire frequency band to transmit information –Capable of data rates of up to 11 Mbps –Fallback rates: 5.5, 2 and 1 Mbps. (Used when interference or congestion occurs) –Dominates market place, because faster Frequency Hopping Spread Spectrum (FHSS) –Divides the frequency band into a series of channels Then changes its frequency channel about every half a second, based on a pseudorandom sequence More secure, –Only capable of data rates of 1 or 2 Mbps

Copyright 2005 John Wiley & Sons, Inc7 - 8 WLAN Topology A wireless Access Point (AP) connected into an Ethernet Switch Same as Ethernet Physical star Logical bus Use the same radio frequencies, so take turns using the network Uses a NIC that transmits radio signals to the AP 10Base-T or 100Base-T

Copyright 2005 John Wiley & Sons, Inc7 - 9 Components of WLANs Network Interface Cards –Available for laptops as PCMCIA cards –Available for desktops as standard cards –Many laptops come with WLAN cards built in –About feet max transmission range Access Points (APs) –Used instead of hubs; act as a repeater Must hear all computers in WLAN –Message transmitted twice »Sender to AP, then AP to receiver

Copyright 2005 John Wiley & Sons, Inc More on the APs and NICs 3 separate channels available for b –All devices using an AP must use the same channel WLAN functions as a shared media LAN –Reduces the interference –Users can roam from AP to AP Initially NIC selects a channel (thus an AP) –Based on “strength of signal” from an AP During roaming, if NIC sees another AP with a stronger signal, attaches itself to this AP Usually a set of APs installed to provide geographical coverage and meet traffic needs –NICs selects a less busy channel if its current channel becomes busy (too many users)

Copyright 2005 John Wiley & Sons, Inc Antennas used in WLANs Omni directional antennas –Transmit in all directions simultaneously –Used on most WLANs Dipole antenna (rubber duck) –Transmits in all direction (vertical, horizontal, up, down) Directional antennas –Project signal only in one direction Focused area; stronger signal; farther ranges –Most often used on inside of an exterior wall To reduce the security issue –A potential problem with WLANs Figures 7.2 and 7.3 will be used here

Copyright 2005 John Wiley & Sons, Inc WLAN Media Access Control Uses CSMA/CA –CA  collision avoidance –A station waits until another station is finished transmitting plus an additional random period of time before sending anything May use two MAC techniques simultaneously –Distributed Coordination Function (DCF) Also called “Physical Carrier Sense Method” –Point Coordination Function (PCF) Also called “Virtual Carrier Sense Method” Optional: (can be set as “always”, “never”, or “just for certain frame sizes”

Copyright 2005 John Wiley & Sons, Inc Distributed Coordination Function Relies on the ability of computers to physically listen before they transmit –When a node wants to send a message: First listens to make sure that the transmitting node has finished, then Waits a period of time longer Each frame is sent using stop-and-wait ARQ –By waiting, the listening node can detect that the sending node has finished and –Can then begin sending its transmission –ACK/NAK sent a short time after a frame is received, –Message frames are sent a somewhat longer time after (ensuring that no collision will occur)

Copyright 2005 John Wiley & Sons, Inc Point Coordination Function (PCF) Solves Hidden Node problem –Two computers can not detect each other’s signals A computer is near the transmission limits of the AP at one end and another computer is near the transmission limits at the other end of the AP’s range –Physical carrier sense method will not work Solution –First send a Request To Send (RTS) signal to the AP Request to reserve the circuit and duration –AP responds with a Clear To Send (CTS) signal, Also indicates duration that the channel is reserved –Computer wishing to send begins transmitting

Copyright 2005 John Wiley & Sons, Inc Message Delineation >>>>>> Figure 7.4 goes here

Copyright 2005 John Wiley & Sons, Inc Preamble of b Packets Used to mark the start of the packet Always transmitted at 1 Mbps Sub fields of Preamble –Long preamble version 16 sync bytes of alternating 1’s and 0’s 1 byte of start of frame delimiter ( ) –Short preamble version 7 sync bytes 1 byte of start of frame

Copyright 2005 John Wiley & Sons, Inc Physical Layer Convergence Protocol (PLCP) Used to indicate data rates and packet length Transmitted at 1 Mbps (long preamble) or at 2 Mbps (short preamble) Fields of PLCP –Signal rate (1 byte) Which of the four speeds to be used –Service field (1 byte) Reserved for future use –Length field (2 bytes) Length of the payload in 8-bit bytes –Header error check field (2 bytes) CRC-16 (if any error found, packet is discarded)

Copyright 2005 John Wiley & Sons, Inc Fields of Payload Header Frame control (2 bytes) –Indicates version of the b protocol –Contains any ACK/NAK and RTS/CTS signals Destination address (6 bytes) –AP-NIC: Address of NIC; NIC-AP-NIC: Address of AP Address 3 (6 bytes) –NIC-AP-NIC: Address of the NIC Source address (6 bytes) –AP-NIC: Address of AP; NIC-AP-NIC: Address of NIC Sequence control (2 bytes) –Contains packet number for error control Address 4 (6 bytes) –Used only for NIC-NIC communications

Copyright 2005 John Wiley & Sons, Inc Other Fields Logical Link Control Protocol Data Unit (LLC PDU) –Same as in Ethernet Physical trailer –4-byte CRC-32 used in Ethernet

Copyright 2005 John Wiley & Sons, Inc Data Transmission in PL Via radio waves –Analog medium –Digital computer data transmitted using analog transmission (Translations done by NIC and AP) Frequency and bandwidth (range of frequencies) – – GHz  83.5 MHz bandwidth in USA Transmission –83.5 MHz divided into 3 channels  22 MHz each (with 3 MHz guard bands between channels) –Data capacity of the circuit: Number of bits sent on each symbol x symbol rate Max symbol rate: depends on bandwidth and SNR –22 MHz  22 million symbols/second (perfect conditions)

Copyright 2005 John Wiley & Sons, Inc Bit Transmission in DSSS Each bit converted into a special code –8-bit or 11-bit code (designed to reduce interference) –Called spreading a bit into many bits across spectrum 1-Mbps DSS –Uses an 11-bit Barker sequence code Transmitted using binary phase shift keying (BPSK) (1 bit per symbol) 11 Mbps signaling rate  1 Mbps data rate 2-Mbps DSS –Uses the same 11-bit code Transmits using Quadrature phase shift keying (QPSK) (2 bits per symbol) 11 Mbps signaling rate  2 Mbps data rate

Copyright 2005 John Wiley & Sons, Inc Mbps DSSS with Barker code >>>>>> Figure 7.5 goes here

Copyright 2005 John Wiley & Sons, Inc IEEE a Operates in a 5 GHz frequency range Total bandwidth is 300 MHz –Faster data rates possible: Up to 54 Mbps 6, 9, 12, 18, 24, 36, 48, and 54 Mbps Uses the same topology as.11b Reduced range because of higher speed –50 meters ( 150 feet) –Highest speed achievable within 15 meter

Copyright 2005 John Wiley & Sons, Inc IEEE a Coverage Provides 4-12 channels (depending on configuration) –Important for coverage; takes more.11a AP to cover the same area (small range) –Make it possible to locate many APs in the same area to increase capacity Figure 7.6 goes here

Copyright 2005 John Wiley & Sons, Inc a Media Access Control Same as.11b Similar packet format –Preamble and PLCP Header: transmitted at 6 Mbps –PLCP parity bit field: used for error checking of header –PLCP tail field: used as a pad to “byte” align the packet –Payload service field: to sync circuitry in NIC and AP

Copyright 2005 John Wiley & Sons, Inc a Packet Layout >>>>>> Figure 7.7 goes here

Copyright 2005 John Wiley & Sons, Inc a Data Transmission Similar to b; spreads its transmission over a wider spectrum Each of 12 channel’s bandwidth = 20 MHz –Broken into 52 separate channels: KHz each, plus guard bands 48 channels for data (sent across all channels in parallel using Orthogonal Frequency Division Multiplexing (OFDM) 4 channels for control

Copyright 2005 John Wiley & Sons, Inc OFDM Versions 6-Mbps version of.11a –Groups data into sets of 24 data bits –Converts each group into an OFDM symbol of 48 bits Pattern chosen enables some error correction –Transmit each symbol in one of 48 sub channels using BPSK sent at 250 KHz 24 data bits x 250 KHz  6 Mbps 9-Mbps version –Groups data into sets of 36 bits –Transmits each symbol using BPSK 36 data bits x 250 KHz  9 Mbps

Copyright 2005 John Wiley & Sons, Inc OFDM Versions (Cont.) 12-Mbps version –Groups data into sets of 48 bits –Transmit OFDM symbol using QPSK (2 bits per symbol) 48 bits x 250 KHz x 2 bits  12 Mbps 18-Mbps version –Groups data into sets of 72 bits; uses QPSK 72 bits x 250 KHz x 2 bits  18 Mbps 24-Mbps version –Groups data into sets of 96 bits –Transmit OFDM symbol using QAM (4 bits per symbol) 96 bits x 250 KHz x 4 bits  24 Mbps

Copyright 2005 John Wiley & Sons, Inc OFDM Versions (Cont.) 36-Mbps version –Groups data into sets of 128 bits; uses QAM –Transmit OFDM symbol using QPSK (2 bits per symbol) 128 bits x 250 KHz x 4 bits  36 Mbps 48-Mbps version –Groups data into sets of 192 bits –Transmit OFDM symbol using 64-QAM (6 bits per symbol) 192 bits x 250 KHz x 6 bits  48 Mbps 54-Mbps version –Groups data into sets of 216 bits; uses 64-QAM 216 bits x 250 KHz x 6 bits  54 Mbps

Copyright 2005 John Wiley & Sons, Inc OFDM Versions (Cont.) >>>>>Fig 7.8 goes here

Copyright 2005 John Wiley & Sons, Inc IEEE g Designed to combine advantages of a and b –Offers higher data rates (up to 54 Mbps) in 2.4 GHz band (as in.11b) with longer ranges –Backward compatible with b.11b devices can interoperate with.11g APs Price to pay: when an.11g AP detects an.11b device, it prohibits.11g devices from operating at higher speeds Uses the same topology as.11b –Provides 3-6 channels (depending on configuration) –54 Mbps rate obtained within 50 meter range

Copyright 2005 John Wiley & Sons, Inc g Media Access Control Almost the same media and error control protocols as.11b –Similar packet layout, except Preambles and headers transmitted at slower speeds (up to a maximum of 11 Mbps) Payload transmitted at higher speeds (up to a max of 54 Mbps) Data Transmission in the Physical Layer –Same techniques in.11a and.11b Uses PSK, QPSK, and CCK to provide.11b rates Uses BPSK, QPSK, and QAM to provide.11a rates

Copyright 2005 John Wiley & Sons, Inc g Media Access Control Almost the same media and error control protocols as.11b –Similar packet layout, except Preambles and headers transmitted at slower speeds (up to a maximum of 11 Mbps) Payload transmitted at higher speeds (up to a max of 54 Mbps) Data Transmission in the Physical Layer –Same techniques in.11a and.11b Uses PSK, QPSK, and CCK to provide.11b rates Uses BPSK, QPSK, and QAM to provide.11a rates

Copyright 2005 John Wiley & Sons, Inc Bluetooth (IEEE ) A standard for Wireless Personal Area Network (WPAN) –Provides networking in a very small area Up to 10 meters (current generation) Up to 100 meters (next generation) –Includes small (1/3 of an inch square) and cheap devices designed to Replace short distance cabling between devices –Keyboards, mouse, handsets, PDAs, etc –Provides a basic data rate of 1 Mbps Can be divided into several voice and data channels –Uses Frequency Shift Keying (FSK) for data transmission (1 bit per symbol)

Copyright 2005 John Wiley & Sons, Inc Bluetooth Topology Uses the term “piconet” to refer to a Bluetooth network –Consists of 8 devices A “master” device controlling other devices, “slaves” –Acts like an AP –Selects frequencies and controls access –All devices in a piconet share the same frequency range

Copyright 2005 John Wiley & Sons, Inc Bluetooth Media Access Control Uses Frequency Hopping Spread Spectrum (FHSS) –Available frequency range ( ) divided into 79 separate 1-MHz channels –A data burst transmitted using one channel, next data burst uses the next channel, and so on. –Channels changed based on a sequence and established by the slave and the master prior to the data transfers 1,600 channel change per second –Also used to minimize interference A noisy channel avoided eventually Not compatible with b –Potential interference problems (especially if many Bluetooth devices present close to.11b devices)

Copyright 2005 John Wiley & Sons, Inc Bluetooth Packet Formats >>>Figure7.9 goes here

Copyright 2005 John Wiley & Sons, Inc Bluetooth Packet Fields/ Subfields Access Code: to sync the sender and receiver –Preamble: Alternating 1’s and 0’s –Sync Bytes: bit patterns based on addresses and packet types –Trailer: Alternating 1’s and 0’s Header: for address and error control –Address: Slave’s address –Type: Payload’s type (e.g., data, control etc.) –Flow Control: 1 means continue, 0 means to stop –ARQ ACK/NAK: 1 means ACK, 0 means NACK –Sequence Number: packet number used for ARQ –Header Error Check: CRC-8 for the header

Copyright 2005 John Wiley & Sons, Inc Bluetooth Packet Fields/Subfields Payload Header –Logical Channel: whether the payload has a data or control frame –Flow Control: same as before (for a another software) –Length: Payload’s length in bytes –Future Use: Reserved Payload: –Format depends on the type of data transmitted Payload trailer –CRC-16 error check code

Copyright 2005 John Wiley & Sons, Inc Infrared Wireless LAN – Require line of sight (LOS) to work (less flexible) – Main advantage: reduced wiring usually mounted in fixed positions to ensure they will hit their targets New version: diffuse infrared, –Operates without a direct LOS by bouncing the infrared signal off of walls –Only able to operate within a single room and at distances of only about feet

Copyright 2005 John Wiley & Sons, Inc Effective Data Rates in WLANs Maximum speed in bits the hardware layers can provide –Depends on Nominal data rate, Error rate, Efficiency of data link layer protocol, and Efficiency of MAC protocol Error plays a greater role in WLANs –Significant impact of interference on performance Causes frequent retransmissions, thus lower data rates

Copyright 2005 John Wiley & Sons, Inc Data Link Protocol Efficiency Factors involved: –Typical WLAN overhead: 51-bytes (with a short preamble) – Packet size: Data packets: assume a 1500-byte for full length Control packets: ACK/NAK packets –Transmission rates: Overhead bits transmission speeds Payload transmission speeds Assuming a mix of short and full length packets –85% average efficiency for b –75% average efficiency for a and g

Copyright 2005 John Wiley & Sons, Inc MAC Protocol Efficiency Uses a controlled approach (PCF) –Imposes more fixed delays initially when traffic is low Due to PCF’s permission based procedures –Allows response time delays increases slowly up to % of capacity –>>>>>>>>Figure 7.11 goes here

Copyright 2005 John Wiley & Sons, Inc Effective Rate for a Computer* b –85% efficiency x 85% capacity x 11 Mbps = 9.6 Mbps 2 users: 9.6 Mbps / 2  4.8 Mbps per user 10 users: 9.6 Mbps/10  960 Kbps per user a –75% efficiency x 85% capacity x 54 Mbps = 34.4 Mbps 2 users: 34.4 Mbps / 2  17.2 Mbps per user 10 users: 34.4 Mbps/10  3.4 Mbps per user g –75% efficiency x 85% capacity x 54 Mbps = 34.4 Mbps 2 users: 34.4 Mbps / 2  17.2 Mbps per user 10 users: 34.4 Mbps/10  3.4 Mbps per user * Under perfect conditions

Copyright 2005 John Wiley & Sons, Inc Effective Rate Estimates –Figure 7-12 goes here

Copyright 2005 John Wiley & Sons, Inc Costs b –Decreasing cost of NICs and AP s a and g –Newer technologies, higher costs Comparison with wired Ethernets –(cost of.11b AP) = (cost of 10/100Base-T switch) –(cost of.11b NIC) = $20 + (cost of 10/100Base-T NIC) –No cost for cabling and its deployment in WLAN Wired Ethernet cable deployment cost: $50 - $400 –Cheapest to install during construction of building –For new buildings Wired LANs are less expensive –Do not forget the need for mobility !!

Copyright 2005 John Wiley & Sons, Inc Best Practice Recommendations Adopt g –Will replace b and.11a –Prices of.11g NICs and APs coming down Wireless vs. Wired –802.11g ~ 10Base-T Similar data rates for low traffic environment When mobility important  g Using WLAN as overlay network (over wired LAN) –WLANs installed In addition to wired LANs –To provide mobility for laptops, etc., –To provide access in hallways, lunch rooms, etc.,

Copyright 2005 John Wiley & Sons, Inc Physical WLAN Design More challenging than designing a traditional LAN –Placement of APs: Locations chosen to: Provide coverage Minimize potential interference Begins with a site survey to determine –Feasibility of desired coverage Measuring the signal strength from temporary APs –Potential sources of interference Most common source: Number and type of walls –Locations of wired LAN and power sources –Estimate of number of APs required –

Copyright 2005 John Wiley & Sons, Inc Physical WLAN Design Begin locating APs –Place an AP in one corner –Move around measuring the signal strength –Place another AP to the farthest point of coverage AP may be moved around to find best possible spot Also depends on environment and type of antenna –Repeat these steps several times until the corners are covered –Then begin the empty coverage areas in the middle Allow about 15% overlap in coverage between APs –To provide smooth and transparent roaming Set each AP to transmit on a different channel

Copyright 2005 John Wiley & Sons, Inc Physical WLAN Design Figure 7.13 goes here

Copyright 2005 John Wiley & Sons, Inc Multistory WLAN Design Must include –Usual horizontal mapping, and –Vertical mapping to minimize interference from APs on different floors Figure 7.14 goes here

Copyright 2005 John Wiley & Sons, Inc WLAN Security Especially important for wireless network –Anyone within the range can use the WLAN Finding a WLAN –Move around with WLAN equipped device and try to pick up the signal –Use special purpose software tools to learn about WLAN you discovered Wardriving – this type reconnaissance Warchalking – writing symbols on walls to indicate presence of an unsecure WLAN

Copyright 2005 John Wiley & Sons, Inc Types of WLAN Security Service Set Identifier (SSID) –Required by all clients to include this in every packet –Included as plain text  Easy to break Wired Equivalent Privacy (WEP) –Requires that user enter a key manually (to NIC and AP) –Communications encrypted using this key –Short key ( bits)  Easy to break by “brute force” Extensible Authentication Protocol (EAP) –WEP keys created dynamically after correct login Requires a login (with password) to a server –After logout, WEP keys discarded by the server Wi-Fi Protected Access (WPA) – new standard –A longer key, changed for every packet

Copyright 2005 John Wiley & Sons, Inc Improving WLAN Performance Similar to improving wired LANs –Improving device performance –Improving wireless circuit capacity –Reducing network demand

Copyright 2005 John Wiley & Sons, Inc Improving WLAN Performance Similar to improving wired LANs –Improving device performance If g widely deployed, replace b cards with.11g cards (may be the cause for slow performance By high-quality cards and APs –Improving wireless circuit capacity Upgrade to g Reexamine placement of APs Check sources of interference (other wireless devices operating in the same frequencies)) Use different type of antennas –Reducing network demand –w

Copyright 2005 John Wiley & Sons, Inc Improving WLAN Device Performance –If g widely deployed, replace b cards with.11g cards May be the cause for slow performance –By high-quality cards and APs Better design Stronger signals, Longer ranges

Copyright 2005 John Wiley & Sons, Inc Improving Wireless Circuit Capacity Upgrade to g Re-place APs –Fewest walls between AP and devices –Ceiling or high mounted to minimize obstacles –On halls, not in closets Remove sources of interference –Other wireless devices operating in the same frequencies Bluetooth devices, cordless phones, etc. Use different type of antennas –Directional antennas in smaller range to get stronger signals (faster throughput)

Copyright 2005 John Wiley & Sons, Inc Reducing WLAN Demand Never place a serve in a WLAN –Doubles the traffic between clients and server Since all communications ii through the AP –Locate the server in the wired part of the network (ideally with a switched LAN) Place wired LAN jacks in commonly used locations –If WLAN becomes a problem, users can switch to wired LAN easily

Copyright 2005 John Wiley & Sons, Inc Implications for Management WLANs becoming common place –Access to internal data, any time, any place Better protection of corporate networks –Public access through WLAN hotspots Competition with cell phone technologies –New cell phone technologies (faster, longer ranges) –Drastic price drops of WLAN devices Widespread Internet access via multiplicity of devices (PDAs, etc,) –Development of new Internet applications New companies created; some old ones out of business –Drastic increase in the amount of data flowing around

Copyright 2005 John Wiley & Sons, Inc Copyright 2005 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information herein.